CVE-2007-2197
Published Apr 24, 2007
Last updated 6 years ago
Overview
- Description
- Race condition in the NeatUpload ASP.NET component 1.2.11 through 1.2.16, 1.1.18 through 1.1.23, and trunk.379 through trunk.445 allows remote attackers to obtain other clients' HTTP responses via multiple simultaneous requests, which triggers multiple calls to HttpWorkerRequest.FlushResponse for the same HttpWorkerRequest object and causes a buffer to be reused for a different request.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:brettle_development:neatupload:1.1.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F28F8C39-7E65-46F9-A547-15527BC66308" }, { "criteria": "cpe:2.3:a:brettle_development:neatupload:1.1.19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E49C50FE-3B50-4F39-BEC1-0A61DC6ACDEB" }, { "criteria": "cpe:2.3:a:brettle_development:neatupload:1.1.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC172C30-0C37-4521-877F-F678274C05B0" }, { "criteria": "cpe:2.3:a:brettle_development:neatupload:1.1.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78B684B3-07E2-4EFE-8EF0-706D77DDFC96" }, { "criteria": "cpe:2.3:a:brettle_development:neatupload:1.1.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D8755BF-9D57-4FEE-91F1-FC224DBA431D" }, { "criteria": "cpe:2.3:a:brettle_development:neatupload:1.1.23:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E95B64F-A426-412D-84FC-718AC2B8F89C" }, { "criteria": "cpe:2.3:a:brettle_development:neatupload:1.2.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC7D3A35-F650-4F1B-8022-56E46BB95039" }, { "criteria": "cpe:2.3:a:brettle_development:neatupload:1.2.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A8F8C7D-199D-4559-A5AD-70B8DC0C6C67" }, { "criteria": "cpe:2.3:a:brettle_development:neatupload:1.2.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C30F900-F512-43ED-94B5-B16DC21BA826" }, { "criteria": "cpe:2.3:a:brettle_development:neatupload:1.2.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D911C642-075B-4E23-ADF7-EC2466F2DEC1" }, { "criteria": "cpe:2.3:a:brettle_development:neatupload:1.2.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F562D423-0FA7-4300-BF22-A296E137207D" }, { "criteria": "cpe:2.3:a:brettle_development:neatupload:1.2.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "74941D91-0096-4777-BDBE-B372393A4D73" }, { "criteria": "cpe:2.3:a:brettle_development:neatupload:trunk.379:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84DA305C-53E1-493B-9D25-54E4310A0DF6" }, { "criteria": "cpe:2.3:a:brettle_development:neatupload:trunk.380:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DB653CC-3D09-473F-A559-4410B9CAB53F" }, { "criteria": "cpe:2.3:a:brettle_development:neatupload:trunk.381:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5358BDA-7937-451D-959E-704463D1D556" } ], "operator": "OR" } ] } ]